Cyber security news for all

More

    Sold Tesla Parts Found Still Containing User Data

    The information storage system in Tesla, apart from having the capacity to display YouTube videos, having access to Netflix, and directly being able to play off Spotify, connecting via WiFi, can also store recently contacted phone numbers.

    These advantages, though, do diminish the fact that the systems need a lot of personal data. Therefore, a user tends not to notice the vast amount of information fed to these devices. This information can reveal extremely personal and sometimes even intimate facts about the owners. This could affect them terribly if it ever falls into the wrong hands.

    A researcher was able to gain access to several used Tesla MCUs (media control units), over 10 of them all removed from electric vehicles during melioration. Each one of these devices had a plethora of sensitive information stored away despite already superannuating.

    Contact from all previously connected phones and calendar entries are there. They also include recent WiFi and Spotify passwords, inputted addresses, and session cookies that grant access to Spotify, youtube, and even more disturbingly E-mail accounts.

    Tesla has a regular procedure of taking out MCUs at their service station, most times to replace it with newer and more advanced models of the device. Authorized Tesla technicians do the removal.

    However, the company leaked these used Tesla MCUs. Presumably, the company did not know about the sales.

    With the research results, the company and its users are at risk. Also, the drivers suffer the risks of any vehicle that has devices onboard which store personal information.

    It is, therefore, recommendable for individuals on their own to perform factory resets when selling a car. Also when returning a rented vehicle, or having an infotainment system looked upon by strangers.

    Conclusion

    While a factory reset may not be undefeatable, it’s likely to make the recovery process difficult and time-consuming enough to provide a meaningful and practical defense. It is advisable that the truly security conscious should destroy the units.

    Recent Articles

    Amazon accounts are the new target of cyber criminals

    Amazon is a popular target for cyber criminals who want to exploit the trust and image of the company among its customers with emails....

    Hackers stole thousands of passport data in Argentina

    In response to millions of dollars ransom refused by the Argentine Immigration Service, a ransomware group released passport data from hundreds of thousands of...

    USA wants to improve cybersecurity of space systems

    CISA has published a table this week that summarizes Chinese activities against cybersecurity. Some attacks have succeeded and enabled hackers to gain a foothold...

    Unknown attackers had access to personal data of Warner Music

    Warner Music Group has admitted a security incident in which customers card details were stolen in some of the company's online stores. Warner Music...

    Donald Trump wants to force a sale of TikTok to Microsoft

    It was recently announced that President Donald Trump plans to prohibit business with the owners of TikTok by decree. The American head of state...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox